unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
增加标签
Tags (allow clear + 0 threshold)
Choose a tag...
Please select a valid tag.
mesudmammad1/CVE-2023-26326_Buddyform_exploit
Create: 2025-02-12 15:31:21 +0000 UTC Push: 2025-02-12 15:31:22 +0000 UTC |
vkairy/cve-2024-21409-repro
Create: 2025-02-12 14:47:05 +0000 UTC Push: 2025-02-12 14:47:05 +0000 UTC |
trustcves/CVE-2024-56883
Create: 2025-02-12 13:35:23 +0000 UTC Push: 2025-02-12 13:35:24 +0000 UTC |
trustcves/CVE-2024-56882
Create: 2025-02-12 13:30:52 +0000 UTC Push: 2025-02-12 13:30:52 +0000 UTC |
ravi5hanka/CVE-2021-43798-for-Windows-and-Linux
Modified exploit for CVE-2021-43798 compatible with both Windows and Linux hosts.
Create: 2025-02-12 09:02:15 +0000 UTC Push: 2025-02-12 09:02:15 +0000 UTC |
ravi5hanka/CVE-2021-43798-Exploit-for-Windows-and-Linux
Modified exploit for CVE-2021-43798 compatible with both Windows and Linux hosts.
Create: 2025-02-12 09:02:15 +0000 UTC Push: 2025-02-12 09:02:15 +0000 UTC |
CybermonkX/CVE-2019-16278_Nostromo-1.9.6---Remote-Code-Execution
An unauthenticated attacker can force server points to a shell file like ‘/bin/sh’ and execute arbitrary commands due to the failure in verifying the URL which leads to path traversal to any file that exists in the system. Nostromo’s versions such as 1.9.6 fail to verify this URL
Create: 2025-02-12 04:38:30 +0000 UTC Push: 2025-02-12 04:38:31 +0000 UTC |
andryhaha/CVE-2024-51378
Create: 2025-02-12 03:48:19 +0000 UTC Push: 2025-02-12 03:48:20 +0000 UTC |
qnole000/CVE-2024-51378
Create: 2025-02-12 03:48:19 +0000 UTC Push: 2025-02-12 03:52:28 +0000 UTC |
0xbassiouny1337/exploit_CVE-2024-42009
This script exploits a stored XSS vulnerability (CVE-2024-42009) in Roundcube Webmail version 1.6.7. It injects a malicious payload into the webmail system, which, when triggered, exfiltrates email content from the victim’s inbox.
Create: 2025-02-11 23:02:42 +0000 UTC Push: 2025-02-11 23:03:19 +0000 UTC |
0xbassiouny1337/CVE-2024-42009
This script exploits a stored XSS vulnerability (CVE-2024-42009) in Roundcube Webmail version 1.6.7. It injects a malicious payload into the webmail system, which, when triggered, exfiltrates email content from the victim’s inbox.
Create: 2025-02-11 23:02:42 +0000 UTC Push: 2025-02-11 23:08:58 +0000 UTC |
istagmbh/CVE-2024-53704
demonstriert, wie mittels missbräuchlicher Nutzung eines Swap-Cookies eine VPN-Session übernommen werden kann. Wichtig: Dieses Projekt dient ausschliesslich zu Bildungs- und Forschungszwecken – bitte nur in Umgebungen verwenden, in denen Du explizit authorisiert bist.
Create: 2025-02-11 20:43:23 +0000 UTC Push: 2025-02-11 20:43:36 +0000 UTC |
yenyangmjaze/cve-2024-10914
Create: 2025-02-11 20:03:16 +0000 UTC Push: 2025-02-11 20:03:49 +0000 UTC |
McTavishSue/CVE-2025-24200
Create: 2025-02-11 15:05:25 +0000 UTC Push: 2025-02-11 15:05:26 +0000 UTC |
aezdmr/CVE-2024-44378
Create: 2025-02-11 15:03:17 +0000 UTC Push: 2025-02-11 15:03:18 +0000 UTC |
sahil3276/CVE-2024-10930
Public Disclosure of CVE-2024-10930
Create: 2025-02-11 07:22:13 +0000 UTC Push: 2025-02-11 07:22:14 +0000 UTC |
sahil3276/CVE-2024-55347
Public Disclosure of CVE-2024-55347
Create: 2025-02-11 06:11:26 +0000 UTC Push: 2025-02-11 06:47:39 +0000 UTC |
moften/CVE-2022-4174_CVE-2022-41742
PoC para CVE-2022-4174_CVE-2022-41742 determinar si es vulnerable Nginx 1.22.1
Create: 2025-02-10 23:04:56 +0000 UTC Push: 2025-02-10 23:04:56 +0000 UTC |
moften/CVE-CVE-2022-41741-CVE-2022-41742
PoC para determinar si existe CVE-CVE-2022-41741/CVE-2022-41742 en version de Nginx 1.22.1
Create: 2025-02-10 23:03:35 +0000 UTC Push: 2025-02-10 23:03:35 +0000 UTC |
Cyber-Trambon/CVE-2024-21413-exploit
Create: 2025-02-10 20:19:42 +0000 UTC Push: 2025-02-10 20:19:43 +0000 UTC |
Previous
1
2
3
4
5
6
7
8
Next